Analysis of Hu-Huang-Fan practical hierarchical identity-Based encryption scheme

Jong Hwan Park, Dong Hoon Lee

    Research output: Contribution to journalArticlepeer-review

    2 Citations (Scopus)

    Abstract

    Recently, Hu et al. have suggested a fully secure hierarchical identity-based encryption (HIBE) scheme that achieves constant size ciphertext and tight security reduction. Their construction was based on Gentry's IBE scheme that supports their security proof. In this paper, we show that their security proof is incorrect. We point out the difference between Gentry's proof and that of Hu et al., and we show that the security of Hu et al.'s HIBE scheme cannot be reduced to their claimed complexity assumption.

    Original languageEnglish
    Pages (from-to)1269-1273
    Number of pages5
    JournalIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
    VolumeE93-A
    Issue number6
    DOIs
    Publication statusPublished - 2010 Jun

    Keywords

    • Bilinear maps
    • Full security
    • Hierarchical identity-based encryption

    ASJC Scopus subject areas

    • Signal Processing
    • Computer Graphics and Computer-Aided Design
    • Electrical and Electronic Engineering
    • Applied Mathematics

    Fingerprint

    Dive into the research topics of 'Analysis of Hu-Huang-Fan practical hierarchical identity-Based encryption scheme'. Together they form a unique fingerprint.

    Cite this